Official Exam Preparation Download From Lead2pass

[2017 New] Lead2pass Cisco 300-320 Exam Dumps Free Download (201-225)

2017 August Cisco Official New Released 300-320 Dumps in Lead2pass.com!

100% Free Download! 100% Pass Guaranteed!

We Lead2pass.com are providing 300-320 exam braindumps here in both PDF file and Online Practice Test Formats. The 300-320 dumps are updated time to time having all the questions answers which cover complete course outlines of the 300-320 certification exam.

A. N_Port to N_Port connections use logical node connection points.B. Flow control is only provided by QoS.C. It must be implemented in an arbitrated loop.D. Communication methods are similar to those of an Ethernet bus.

Answer: AExplanation:Fibre Channel supports a logical node connection point between node ports (N_ports). This is similar to TCP and UDP sockets.

Answer: AExplanation:“In the base design, the core layer supports the first stage of firewalls.”

QUESTION 205The Cisco Nexus 1000V is intended to address which disadvantage of the VMware vSphere solution?

A. Inability to deploy new functional servers without requiring physical changes on the networkB. Complexity added by the requirement for an ESX host for each virtual machineC. Network administrators lack control of the access layer of the networkD. To increase the number of physical infrastructure and the virtual machines that can be managed

Answer: C

QUESTION 206With respect to address summarization, which of the following statements concerning IPv4 and IPv6 is true?

A. The potential size of the IPv6 address blocks suggests that address summarization favors IPv6 over IPv4.B. Role based addressing using wildcard masks to match multiple subnets is suitable for IPv4, but unsuitable for IPv6.C. In order to summarize, the number of subnets in the IPv4 address block should be a power of 2 while the number of subnets in the IPv6 address block should be a power of 64.D. WAN link addressing best supports summarization with a /126 subnet for IPv4 and a /31 for IPv6.

Answer: BExplanation:http://www.ciscopress.com/articles/article.asp?p=1763921For IPv6 access lists, the wildcard masks are not usually used. All source and destination addresses are notated in the form of prefixes. Therefore, it is important that subnets that are to be grouped in an access list falling within a summarized address range.

QUESTION 207There are 3 steps to confirm whether a range of IP addresses can be summarized. Which of thefollowing is used in each of these 3 steps?

A. The first number in the contiguous block of addressesB. The last number in the contiguous block of addressesC. The size of the contiguous block of addressesD. The subnet mask of the original network address

Answer: C

QUESTION 208A well-designed IP addressing scheme supporting role-based functions within the subnet will result in the most efficient use of which technology?

QUESTION 209Which of the following is true regarding the effect of EIGRP queries on the network design?

A. EIGRP queries will be the most significant issue with respect to stability and convergenceB. EIGRP queries are not a consideration as long as EIGRP has a feasible successor with a next hop AD that is greater than the FD of the current successor routeC. EIGRP queries will only increase the convergence time when there are no EIGRP stubs designed in the network

Answer: A

QUESTION 210Which of the following is a result when designing multiple EIGRP autonomous systems within the Enterprise Campus network?

A. Improves scalability by dividing the network using summary routes at AS boundariesB. Decreases complexity since EIGRP redistribution is automatically handled in the backgroundC. Reduces the volume of EIGRP queries by limiting them to one EIGRP ASD. Scaling is improved when a unique AS is run at the Access, Distribution, and Core layers of the network

Answer: AExplanation:“Organizations with very large networks may use multiple EIGRP autonomous systems as a way to divide their networks: Generally, this type of design approach uses summary routes at autonomous system boundaries to contain summary address blocks of prefixes in very large networks and to address the EIGRP query propagation issue.”

QUESTION 211When designing the routing for an Enterprise Campus network it is important to keep which of the following route filtering aspects in mind?

A. Filtering is only useful when combined with route summarizationB. It is best to filter (allow) the default and summary prefixes only in the Enterprise Edge to remote sites or site-to-site IPsec VPN networksC. IGPs (for example EIGRP or OSPF) are superior to route filtering in avoiding inappropriate transit traffic through remote nodes or inaccurate or inappropriate routing updatesD. The primary limitation of router filtering is that it can only be applied on outbound updates

Answer: B

QUESTION 212Which statement is the most accurate regarding IPsec VPN design for an Enterprise Campus environment?

A. VPN device IP addressing must align with the existing Campus addressing scheme.B. The choice of a hub-and-spoke or meshed topology ultimately depends on the number of remotes.C. Sizing and selection of the IPsec VPN headend devices is most affected by the throughput bandwidth requirements for the remote offices and home workerD. Scaling considerations such as headend configuration, routing protocol choice, and topology have the broadest impact on the design.

Answer: D

QUESTION 213Refer to the exhibit. The Cisco Nexus 1000V in the VMware vSphere solution effectively creates an additional access layer in the virtualized data center network; which of the following 1000V characteristics can the designer take advantage of?

A. Offloads the STP requirement from the external Access layer switchesB. If upstream access switches do not support vPC or VSS the dual-homed ESX host traffic can still be distributed using virtual port channel host mode using subgroups automatically discovered through CDPC. Allows transit traffic to be forwarded through the ESX host between VMNICsD. Can be divided into multiple virtual device contexts for service integration, enhanced security, administrative boundaries, and flexibility of deployment

Answer: BExplanation:“Virtual Port Channel Host Mode Virtual Port Channel Host Mode (vPC-HM) , allows a port channel from the Cisco Nexus 1000V to be terminated on two separate upstream switches, even if these switches do not support a clustering technology, such as vPC or VSS.”

QUESTION 214Which unique characteristics of the Data Center Aggregation layer must be considered by an Enterprise Campus designer?

A. Layer 3 routing between the Access and Aggregation layers facilitates the ability to span VLANs across multiple access switches, which is a requirement for many server virtualization and clustering technologies.B. “East-west” server-to-server traffic can travel between aggregation modules by way of the core, but backup and replication traffic typically remains within an aggregation module.C. Load balancing, firewall services, and other network services are commonly integrated by the use of service modules that are inserted in the aggregation switches.D. Virtualization tools allow a cost effective approach for redundancy in the network design by using two or four VDCs from the same physical switch.

Answer: C

QUESTION 215Support of vPC on the Cisco Nexus 5000 access switch enables various new design options for the data center Access layer, including which of the following?

A. The vPC peer link is not required for Access layer control traffic, and can instead be used to span VLANs across the vPC access switchesB. A single switch can associate per-interface with more than one vPC domainC. vPC can be used on both sides of the MEC, allowing a unique 16-link EtherChannel to be built between the access and aggregation switchesD. Allows an EtherChannel between a server and a access switch while still maintaining the level of availability that is associated with dual-homing a server to two different access switches

Answer: C

QUESTION 216Which technology is an example of the need for a designer to clearly define features and desired performance when designing advanced WAN services with a service provider?

Answer: CExplanation:This answer is an example that show that the designer did not clearly defined his needs because the SP gave a L3 service when L2 was needed.

QUESTION 217Which of the following is true concerning best design practices at the switched Access layer of the traditional layer2 Enterprise Campus Network?

A. Cisco NSF with SSO and redundant supervisors has the most impact on the campus in the Access layerB. Provide host-level redundancy by connecting each end device to 2 separate Access switchesC. Offer default gateway redundancy by using dual connections from Access switches to redundant Distribution layer switches using a FHRPD. Include a link between two Access switches to support summarization of routing information from the Access to the Distribution layer

Answer: A

QUESTION 218Which protocol will not adhere to the design requirement of the control plane being either separated or combined within a virtualization technology?

A. FHRPB. STPC. CEFD. NSF with SSO

Answer: B

QUESTION 219Which of the following features might be used by the Enterprise Campus network designer as a means of route filtering?

QUESTION 220The network designer needs to consider the number of multicast applications and sources in thenetwork to provide the most robust network possible. Which of the following is a consideration the designer must also address?

A. The IGPs should utilize authentication to avoid being the most vulnerable componentB. With SSM source or receiver attacks are not possibleC. With Shared Trees access control is always applied at the RPD. Limit the rate of Register messages to the RP to prevent specific hosts from being attacked on a PIM-SM network

Answer: B

QUESTION 221When considering the design of the E-Commerce topology which of the following are true?

A. One-armed SLB design with multiple security contexts removes the need for a separate firewall in the core layerB. Two-firewall-layer SLB design considers the aggregation and access layers to be trusted zones, requiring no security between the web, application, and database zonesC. One-armed SLB design with two firewall layers ensures that non load-balanced traffic still traverses the ACE so that the health and performance of the servers is still being monitoredD. In all cases there will be configuration requirements for direct access to any servers or for nonload-balanced sessions initiated by the servers

Answer: A

QUESTION 222Distinct, physical redundancy within a network layer is a key characteristic that contributes to the high availability of the hierarchical network design. Which of the following is not an examples of this model?

A. SAN extension with dual fabrics such as a yellow VSAN and a blue VSAN utilized via multipath softwareB. Redundant power supplies and hot-swappable fan trays in Aggregate switchesC. A single SAN fabric with redundant uplinks and switchesD. Servers using network adapter teaming software connected to dual-attached access switches

QUESTION 224Which two of these are correct regarding the recommended practice for distribution layer design? (Choose two.)

A. use a redundant link to the coreB. use a Layer 2 link between distribution switchesC. never use a redundant link to the core because of convergence issuesD. use a Layer 3 link between distribution switches with route summarizationE. use a Layer 3 link between distribution switches without route summarization

Answer: AEExplanation:We need to summarize from distribution to core but not between distribution switches.

QUESTION 225Which three of these Metro service types map to E-Line (versus E-LAN) services that are defined by the Metro Ethernet Forum (MEF)? (Choose three.)